I introduced my kill chain concept to a great group at TechnoSecurity this week. It is a concept that I mashed from the military definition as well as that of the 2011 cyber kill chain of Lockheed Martin. The developing … Continue reading →

I will be starting a new weekly video series called the Mobile Forensic Minute. This will be hosted on The Mobile Forensic Investigation Facebook page and announced on the @MobileDeviceESI Twitter account. Follow and share both to keep up to … Continue reading →

In the previous post we discussed the need to be vigilant in the analysis of app data obtaining from today’s mobile devices. Furthermore, I made it clear that mobile forensic software is not the end all solution to your app … Continue reading →

…statistically speaking producing an almost psychic ability to determine today’s paramount app is about the same as producing winning lottery numbers for each lotto across the US everyday!… Continue reading →

Understanding that there is a considerable amount of location information and geo related data within a mobile device is the first step. Being able to locate and recover that information is the second, often missed, step. Continue reading →

In the last two weeks, I have met with representatives from over 80 different countries through several digital initiatives and partnerships I am a part of. These meetings have taken place across the globe, but the the theme of each … Continue reading →

For some time now the talk in the mobile forensic world is all about ISP, JTAG, and chip-off. Let us take a look at what people are really talking about, why having an understaning of these methods is critical, and … Continue reading →

First, before I start back into my blog (yes it has been some time), I wanted to start it off with a thank you… It seems almost surreal in a way, with the many opportunities that have presented themselves in … Continue reading →

I helped with a couple of posts in the last month that dealt with International Mobile (Station) Equipment Identity (IMEIs) produced and displayed by both mobile forensic software and also by the carriers themselves. The assistance was primarily dealing with … Continue reading →

As everyone knows, mobile digital devices and the data contained on these devices is here to stay. I do not think anyone ever thought a small mobile telephone would ever fade away, but the growth of the tech is another story. I … Continue reading →